# Send proxymock to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "proxymock",
    "name": "proxymock",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/mleray24/proxymock",
    "canonicalUrl": "https://clawhub.ai/mleray24/proxymock",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/proxymock",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=proxymock",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "SKILL.md",
      "references/cli-reference.md",
      "references/language-reference.md",
      "scripts/replay_and_report.sh"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "slug": "proxymock",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-12T14:21:25.110Z",
      "expiresAt": "2026-05-19T14:21:25.110Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=proxymock",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=proxymock",
        "contentDisposition": "attachment; filename=\"proxymock-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "proxymock"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/proxymock"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/proxymock",
    "downloadUrl": "https://openagent3.xyz/downloads/proxymock",
    "agentUrl": "https://openagent3.xyz/skills/proxymock/agent",
    "manifestUrl": "https://openagent3.xyz/skills/proxymock/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/proxymock/agent.md"
  }
}
```
## Documentation

### proxymock

proxymock captures real API and database traffic via a transparent proxy, then uses it to create mocks and tests — no code changes required.

### Core Workflow

record → inspect → mock / replay

Record traffic with proxymock record -- <app-command>
Inspect captured RRPairs with proxymock inspect
Mock dependencies with proxymock mock -- <app-command>
Replay recorded tests with proxymock replay --test-against <url>

### Record Traffic

# Record while running app as child process (recommended)
proxymock record -- go run .
proxymock record -- npm start

# Custom output dir
proxymock record --out my-recording -- python app.py

# Record database traffic via reverse proxy
proxymock record --map 65432=postgres://localhost:5432 -- ./my-app

# Record with custom app port
proxymock record --app-port 3000 -- ./my-app

Architecture: inbound proxy on :4143 → app on --app-port (default 8080), outbound proxy on :4140 captures egress.

### Mock Server

# Start mock server, launch app as child
proxymock mock -- go run .

# Source mocks from specific dir
proxymock mock --in ./my-recordings -- npm start

# Fast mode (no simulated latency)
proxymock mock --fast -- ./my-app

# Don't write observed traffic to disk
proxymock mock --no-out -- ./my-app

# Database mock via reverse proxy
proxymock mock --map 65432=localhost:5432 -- ./my-app

When mocking, app connects to external services through proxy on :4140. Matched requests return recorded responses; unmatched requests pass through to real backends.

### Replay / Load Test

# Replay recorded tests against app
proxymock replay --test-against http://localhost:8080

# Load test: 10 virtual users for 5 minutes
proxymock replay --test-against http://localhost:8080 --vus 10 --for 5m

# Run tests 3 times
proxymock replay --test-against http://localhost:8080 --times 3

# Fail on conditions (CI-friendly)
proxymock replay --test-against http://localhost:8080 \\
  --fail-if "requests.failed!=0" \\
  --fail-if "latency.p99>100"

# Multi-service routing
proxymock replay \\
  --test-against auth=auth.example.com \\
  --test-against frontend=http://localhost:8080 \\
  --test-against http://localhost:9000

Validation metrics: latency.{avg,p50,p90,p95,p99,max,min}, requests.{total,succeeded,failed,per-second,per-minute,response-pct,result-match-pct}.

### Inspect (TUI)

proxymock inspect                    # Current directory
proxymock inspect --in ./my-recording
proxymock inspect --demo             # Demo data

Note: inspect launches a terminal UI — run with pty=true in exec.

### Generate Mocks from OpenAPI

proxymock generate api-spec.yaml
proxymock generate --out ./mocks --host api.staging.com api-spec.yaml
proxymock generate --tag-filter "users,orders" api-spec.yaml
proxymock generate --include-optional --examples-only api-spec.yaml

### File Utilities

# Compare RRPair files for differences
proxymock files compare --in recorded/ --in replayed/

# Convert between formats
proxymock files convert --in proxymock --out-format json

# Update mock signatures after editing RRPairs
proxymock files update-mocks --in ./my-mocks

### Cloud (Enterprise)

proxymock cloud push snapshot    # Push to Speedscale cloud
proxymock cloud pull snapshot    # Pull from cloud

### Import Traffic

# Import traffic from a snapshot file
proxymock import snapshot.json
proxymock import --in ./snapshots snapshot.tar.gz

### MCP Server

# Start Model Context Protocol (MCP) server for AI tool integration
proxymock mcp

### Other

proxymock send-one path/to/test.md http://localhost:8080   # Send single request
proxymock init --api-key <key>                              # Initialize config
proxymock certs                                             # Manage TLS certs
proxymock version                                           # Version info
proxymock completion bash                                   # Generate shell completions (bash/zsh/fish/powershell)

### RRPair Files

Traffic is stored as RRPair (request/response pair) markdown files under proxymock/ directory. Each file contains:

### REQUEST (TEST) ### or ### REQUEST (MOCK) ### — the captured request
### RESPONSE ### — the captured response
### SIGNATURE ### — mock matching criteria (for mocks)

Files are human and LLM readable. Edit them directly to modify test data or mock responses, then run proxymock files update-mocks if you changed request details that affect the signature.

### Proxy Environment

When not using -- <command> child process mode, set proxy env vars manually:

# HTTP/HTTPS/gRPC
export http_proxy=http://localhost:4140
export https_proxy=http://localhost:4140
export grpc_proxy=http://$(hostname):4140

# Database (SOCKS)
export all_proxy=socks5h://localhost:4140

See language reference for language-specific setup.

### Reference

For signature matching, architecture details, and advanced usage: see references/cli-reference.md.
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: mleray24
- Version: 1.0.0
## Source health
- Status: healthy
- Item download looks usable.
- Yavira can redirect you to the upstream package for this item.
- Health scope: item
- Reason: direct_download_ok
- Checked at: 2026-05-12T14:21:25.110Z
- Expires at: 2026-05-19T14:21:25.110Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/proxymock)
- [Send to Agent page](https://openagent3.xyz/skills/proxymock/agent)
- [JSON manifest](https://openagent3.xyz/skills/proxymock/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/proxymock/agent.md)
- [Download page](https://openagent3.xyz/downloads/proxymock)